csce201-lect6.b

csce201-lect6.b - CSCE201 CSCE201 IntroductiontoInformation...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
CSCE 201 CSCE 201 Introduction to Information  Introduction to Information  Security  Security  Fall 2010 Fall 2010 Computer Recovery Computer Recovery
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 201 - Farkas 2 Reading assignments Reading assignments Required for this class: How to use the Backup utility to back up files and folders in Windows XP Home Edition, http://support.microsoft.com/kb/308422 Ed Bott .Windows XP Backup Made Easy , http://www.microsoft.com/windowsxp/using/setup/learnmore/ Required for next class: D. Cross, Data Protection and Recovery in Windows XP, http://technet.microsoft.com/en-us/library/bb457020.aspx
Background image of page 2
CSCE 201 - Farkas 3 Protection of Personal Computers Security Policy Formal Informal Security Mechanisms Identification and Authentication Access Control Applications and updates Physical security Network-level security
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 201 - Farkas 4 Protection of Computing Resources Threats: Errors of users Natural/man-made/machine disasters Dishonest insider Disgruntled insider Outsiders Etc. Protection against threats Technical protections Non-technical protections Prevent, deter, detect, tolerate, recover
Background image of page 4
CSCE 201 - Farkas 5 Physical Security Protection needs outside the computer system Direct threats Stealing, vandalism, espionage, etc. Typical protection: guards, locks, fences, etc. Indirect threats Natural disaster, electric surge, fire, etc. Protection: based on type of threat, e.g., power surge protection, location of computing facility, etc.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 201 - Farkas 6 Natural Disasters Computer systems Same vulnerability as homes, cars, etc. Additional sensitivity: operating environment, e.g., temperature, humidity, etc. Vulnerable component: Hardware devices Data and software Goal: reduce the impact of a disaster
Background image of page 6
CSCE 201 - Farkas 7 How to Measure Impact? Economic impact:
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/13/2011 for the course CSCE 201 taught by Professor Staff during the Fall '10 term at South Carolina.

Page1 / 27

csce201-lect6.b - CSCE201 CSCE201 IntroductiontoInformation...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online